3
0
Fork 0
forked from mirrors/nixpkgs
nixpkgs/pkgs/tools/networking/wireguard-tools/default.nix

60 lines
1.4 KiB
Nix
Raw Normal View History

{
stdenv, fetchzip,
iproute ? null,
libmnl ? null,
makeWrapper ? null,
openresolv ? null,
procps ? null,
wireguard-go ? null,
}:
with stdenv.lib;
stdenv.mkDerivation rec {
pname = "wireguard-tools";
version = "0.0.20191012";
src = fetchzip {
url = "https://git.zx2c4.com/WireGuard/snapshot/WireGuard-${version}.tar.xz";
sha256 = "0nwcx7m5cpp4h1bclswiqq1jzj08xzpxmq5s4rcfqmrp59cmwgrs";
};
sourceRoot = "source/src/tools";
nativeBuildInputs = [ makeWrapper ];
2018-09-29 13:01:21 +01:00
buildInputs = optional stdenv.isLinux libmnl;
makeFlags = [
"DESTDIR=$(out)"
"PREFIX=/"
"WITH_BASHCOMPLETION=yes"
"WITH_SYSTEMDUNITS=yes"
"WITH_WGQUICK=yes"
];
postFixup = ''
substituteInPlace $out/lib/systemd/system/wg-quick@.service \
--replace /usr/bin $out/bin
'' + optionalString stdenv.isLinux ''
for f in $out/bin/*; do
wrapProgram $f --prefix PATH : ${makeBinPath [procps iproute openresolv]}
done
'' + optionalString stdenv.isDarwin ''
for f in $out/bin/*; do
wrapProgram $f --prefix PATH : ${wireguard-go}/bin
done
'';
2019-06-01 21:17:25 +01:00
passthru.updateScript = ./update.sh;
meta = {
description = "Tools for the WireGuard secure network tunnel";
downloadPage = "https://git.zx2c4.com/WireGuard/refs/";
homepage = "https://www.wireguard.com/";
license = licenses.gpl2;
maintainers = with maintainers; [ elseym ericsagnes mic92 zx2c4 globin ma27 ];
platforms = platforms.unix;
};
}